"Please view the document i uploaded for you using Google docs. Click here just sign in with your email to view the document its very important. Thank you," the email in question briefly states, and offers a link to a bogus Google Account login page:

Even though the page in question looks nothing like the real one, inexperienced users might fall for it nevertheless.

The harvested login credentials will be sold and used to hijack the accounts and used to launch additional spam attacks and scams.

Spotlight

Microsoft Edge, the new browser in Windows 10, represents a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that arenít present in older versions.

35 percent of employees would sell information on company patents, financial records and customer credit card details if the price was right. This illustrates the growing importance for organizations to deploy data loss prevention strategies.

Sun Tzu's writings have been studied throughout the ages by professional militaries and can used to not only answer the question of whether or not we are in a cyberwar, but how one can fight a cyber-battle.

Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.